unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
How do you assess the risk of AI within your operations?
How do you assess the risk of AI within your operations?How do you assess the risk of AI within...
2024-7-3 06:47:21 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
ethical
security
regulatory
assessing
A Brief History of SmokeLoader, Part 2
IntroductionIn this two-part blog series, we explore the evolution of SmokeLoader, a malware downlo...
2024-7-3 04:12:59 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
smokeloader
c2
encryption
windows
security
USENIX Security ’23 – Efficient 3PC for Binary Circuits with Application to Maliciously-Secure DNN Inference
Authors/Presenters:Yun Li, Tsinghua University, Ant Group; Yufei Duan, Tsinghua Univers...
2024-7-3 03:0:0 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
tsinghua
ant
usenix
security
youtube
Upcoming Book on AI and Democracy
If you’ve been reading my blog, you’ve noticed that I have written a lot about AI and d...
2024-7-3 02:11:18 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
democracy
assisted
revolution
artificial
democratic
Latest OpenSSH Vulnerability Might Impact 14M Linux Systems
Qualys this week reported the discovery of a Remote Unauthenticated Code Execution (RCE) vulnerabil...
2024-7-3 01:53:29 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
openssh
software
qualys
sshd
Comic Agilé – Mikkel Noe-Nygaard, Luxshan Ratnaravi – #295 – Agile Consultant Ambitions
Community Chats Webinars LibraryHomeCybersecurity NewsFeaturesIndustry SpotlightNews R...
2024-7-3 01:0:0 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
webinars
boulevard
openssh
‘Perfect 10’ Apple Supply Chain Bug — Millions of Apps at Risk of CocoaPods RCE
10 year old vulnerabilities in widely used dev tool include a CVSS 10.0 remote code execution bug...
2024-7-3 00:30:24 | 阅读: 13 |
收藏
|
Security Boulevard - securityboulevard.com
cocoapods
software
orphaned
richi
Secrets Exposed: The Rise of GitHub as an Attack Vector
A Look at Chariot’s Capability to ProtectOn June 6, 2024, an anonymous user posted nearly 300 GB...
2024-7-3 00:21:13 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
github
chariot
praetorian
belonging
repository
We’re Asking the Wrong Questions About regreSSHion
By now you have likely heard about the latest OpenSSH security issue (dubbed regreSSHion, since all...
2024-7-3 00:0:38 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
openssh
regresshion
deepfactor
appsec
Weaponizing API discovery metadata
API discovery is a thing. Articles on API security often highlight that finding and documenting AP...
2024-7-3 00:0:0 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
catalog
security
burp
ietf
Stormy Skies: Weathering the Threat of Ransomware in the Cloud
Ransomware attacks on cloud environments have surged in the past few years, thanks to t...
2024-7-2 23:43:10 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
cloud
security
ransomware
stormy
The Importance of an Up-to-Date Information Security Plan for Automotive OEMs and Dealerships
For OEMs and dealerships, a written information security plan is essential for protecting sensitive...
2024-7-2 23:31:17 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
threats
automotive
dealerships
nuspire
Like Shooting Phish in a Barrel
PHISHING SCHOOLBypassing Link CrawlersYou’ve just convinced a target user to click your link. In...
2024-7-2 23:30:23 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
crawlers
phishing
seg
segs
crawler
RSAC Fireside Chat: Amplifier Security taps LLMs to help organizations foster a security culture
By Byron V. AcohidoSecurity teams rely on an ever-growing stack of cybersecurity too...
2024-7-2 23:28:35 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
amplifier
ampy
donnelly
acohido
Embracing Zero Trust: DoD’s New Cybersecurity Paradigm (Part 1)
In a world where digital infrastructure has no clear boundaries, ensuring robust se...
2024-7-2 22:15:0 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
cimcor
allers
A Deep Dive into the EU Cybersecurity Certification Scheme on Common Criteria (EUCC)
As cyber threats evolve, the European Union has taken significant steps to bolster cybersecurity a...
2024-7-2 21:0:0 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
eucc
security
ict
evaluation
It’s World UFO Day! Defend Against Unidentified File Objects (UFOs) with Votiro
Happy World UFO Day! That’s right, today, July 2nd, is World UFO Day. And if you’re reading this af...
2024-7-2 21:0:0 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
votiro
ufos
threats
ddr
ufo
Best Parental Control App for Parents in 2024
Keeping kids safe online has never been more important in our tech-driven world. With the internet...
2024-7-2 20:53:25 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
parental
monitoring
parents
safes
ensuring
Building Resilience in the Chip Supply Chain
In the spring of 2021 amidst the throes of COVID, another (related) crisis was reaching fever pitch...
2024-7-2 20:0:17 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
chip
resilience
shortage
Responsible AI Governance and Policy: Guiding Principles
In the fast-paced world of business, innovation often takes center stage. But as we harness the pow...
2024-7-2 19:16:44 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
fairness
ethical
principles
regulations
governance
Previous
131
132
133
134
135
136
137
138
Next